
Thanks to Simon Howard for pointing me toward a new article by Mati Aharoni and William M. Hidalgo titled
Cisco SNMP configuration attack with a GRE tunnel. The article shows the dangers of not denying packets from the Internet using spoofed internal addresses. The article builds on Mark Wolfgang's
Exploiting Cisco Routers: Part 1, where an intruder uses an SNMP SET command to retrieve a router configuration file via TFTP. As Simon wrote in his email to me: "Applying an inbound ACL on the Ethernet0/0 interface denying any traffic from the 192.168.1.0 network would resolve this issue [in the article]."
On a related note, I am looking forward to the second edition of
Essential SNMP, pictured at left.
Tidak ada komentar:
Posting Komentar